Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Consortium chain permission control method based on digital certificates and CA authentication system

A digital certificate and CA certification technology, applied in digital transmission systems, user identity/authority verification, transmission systems, etc., can solve the problems of large granularity of blockchain authority and no access function, to solve authority control and satisfy privacy needs, and the effect of meeting the safety requirements

Active Publication Date: 2017-12-01
HANGZHOU QULIAN TECH CO LTD
View PDF3 Cites 104 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The internationally accepted elliptic curve digital signature algorithm or national secret digital signature algorithm is used to realize the generation of digital certificates and the signature and verification of security messages, which solves the defects of traditional block chains such as large granularity of authority or even no access function, and provides a new foundation for the district. Blockchain users provide anonymous transaction features, which improves the security of blockchain transactions and meets the privacy needs of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Consortium chain permission control method based on digital certificates and CA authentication system
  • Consortium chain permission control method based on digital certificates and CA authentication system
  • Consortium chain permission control method based on digital certificates and CA authentication system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0050] The alliance chain verification node applies to EACA for the corresponding ECERT through an offline written request, such as figure 2 As shown, after obtaining the ECERT, apply for the corresponding RCERT to RACA through an offline written request, such as image 3 shown. Assume that the alliance chain has four nodes ABCD, each of which obtains the corresponding ECERT and RCERT through offline channels, and then ABCD establishes a P2P connection with each other, and at the same time verifies the legitimacy of the sent ECERT and RCERT, such as Figure 4 shown.

[0051] At this time, if there is a new non-verification node E that needs to join, node E will provide ECERT to the VP node to prove that it has permission to access the alliance chain, but cannot provide RCERT. At the same time, verification node A will provide ECERT to non-verification node E and RCERT to prove the identity of its verification node, such as Figure 5 shown.

[0052] If the client needs to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a consortium chain permission control method based on digital certificates and a CA authentication system. In a consortium chain, the enrollment control and automatic authorization of the consortium chain are realized through a layered digital certificate issuance system. The method of the invention pre-defines three kinds of permission mechanisms for respectively controlling enrollment permissions between consortium chain nodes, role permissions of the consortium chain nodes and access permissions of blockchain users. Three kinds of digital certificates including the enrollment certificate, role certificate and transaction certificate are used for respectively controlling the three permissions of node enrollment, role identification and client enrollment. An internationally accepted elliptic curve digital signature algorithm or a national crypto digital signature algorithm is used for achieving the generation of the digital certificates and secure message signature and validation, the defects of being large in permission granularity of a traditional blockchain or even having no enrollment functions and the like are overcome, the blockchain users are provided with anonymous transaction features, the security of blockchain transactions is improved, and the privacy needs of the users are met.

Description

technical field [0001] The present invention relates to a decentralized blockchain ledger technology and an authority control method, in particular to an alliance chain authority control method based on a digital certificate and a CA certification system. Background technique [0002] Blockchain technology, blockchain is a new type of decentralized protocol that can safely store digital currency transactions or other data, information cannot be forged and tampered with, and transaction confirmation on the blockchain is shared by all nodes on the blockchain Completed, the consistency is guaranteed by the consensus algorithm. A public ledger is maintained on the blockchain to store the balance of all users on the blockchain network. The public ledger is visible to any node on the storage block, thereby ensuring that it cannot be forged and tamper. [0003] On the traditional blockchain, all users are anonymous and have no access control. Anyone can join or exit. In the specia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3252H04L9/3268H04L63/0421H04L63/08H04L63/0823H04L63/10H04L63/20
Inventor 尹可挺梁秀波邱炜伟李启雷李伟
Owner HANGZHOU QULIAN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products